CN101199158A - Method and apparatus for ciphering and re-ordering packets in a wireless communication system - Google Patents

Method and apparatus for ciphering and re-ordering packets in a wireless communication system Download PDF

Info

Publication number
CN101199158A
CN101199158A CNA2006800219296A CN200680021929A CN101199158A CN 101199158 A CN101199158 A CN 101199158A CN A2006800219296 A CNA2006800219296 A CN A2006800219296A CN 200680021929 A CN200680021929 A CN 200680021929A CN 101199158 A CN101199158 A CN 101199158A
Authority
CN
China
Prior art keywords
bag
output packet
partial sequence
processor
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006800219296A
Other languages
Chinese (zh)
Other versions
CN101199158B (en
Inventor
阿尔基诺斯·H·瓦亚诺斯
弗朗切斯科·格里利
艾蒂安·F·沙波尼尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN101199158A publication Critical patent/CN101199158A/en
Application granted granted Critical
Publication of CN101199158B publication Critical patent/CN101199158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/04Error control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • H04L1/1642Formats specially adapted for sequence numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/02Data link layer protocols

Abstract

Techniques for performing ciphering and re-ordering using a single full sequence number are described. A transmitter ciphers input packets to obtain ciphered packets, with each input packet being ciphered with a full sequence number. The transmitter generates output packets for the ciphered packets, with each output packet including a partial sequence number used for re-ordering and derived from the full sequence number. The full sequence number may be incremented for each input packet or each byte of each packet. The partial sequence number may be used as a sequence number for RLC and may be used for re-ordering, duplicate detection, error correction, and/or other functions. A receiver performs the complementary processing, re-orders received packets based on the partial sequence number included in each packet, and deciphers the received packets using the partial sequence number included in each received packet.

Description

In wireless communication system, bag is encrypted and resequenced
35 U.S.C. § advocate priority 119 times
Present application for patent is advocated the 60/675th of being entitled as of application on April 26th, 2005 " Reducing Communication ProcessingDelays in a Wireless Communication System ", the 60/784th of being entitled as of No. 277 provisional application cases and on March 21st, 2006 application " Reducing Communication Processing Delays in a WirelessCommunication System ", the priority of No. 876 provisional application cases, described provisional application case transfer this assignee and clearly are incorporated herein by reference.
Technical field
This disclosure relates generally to communication, and more particularly relates to the technology of bag being encrypted and resequencing at wireless communication system of being used for.
Background technology
Wireless communication system through widespread deployment so that for example various communication services such as voice, video, bag data, broadcasting, information receiving and transmitting to be provided.These systems can support the multiaccess system of a plurality of user's communications by sharing the available system resource.The example of this type of multiaccess system comprises code division multiple access (CDMA) system, time division multiple access (TDMA) system, frequency division multiple access (FDMA) system, and OFDM (OFDMA) system.
The various functions such as transmission again that wireless communication system can utilize radio link control (RLC) to carry out for example receiving the detection and the mistake of the rearrangement of wrapping, the bag of losing or miss packet receiving.RLC appends to each bag with sequence number usually so that realize these functions.RLC also resides on the internal network entity place away from the base station that radio communication is provided usually.Therefore, the feedback at RLC from the receiver to the reflector can cause the delay that prolongs.In order to shorten this delay, RLC is movable to the base station.Yet, RLC is implemented in the place, base station may causes other problem.For instance, the user can by from a base station handover to another base station.The RLC entity at place, two base stations then makes its sequence number synchronization with needs, makes the user suitably to sort to the bag that receives from these base stations.
Summary of the invention
This paper describes the technology of using single full sequence numbers to encrypt and resequence of being used to.These technology can reduce the overhead of each bag, and the SYN of RLC between the handover period also can be provided.
According to the embodiment of the invention, a kind of equipment is described, it comprises at least one processor and memory.Processor is encrypted to obtain encrypted packet the input bag, and wherein each is encrypted each input bag with full sequence numbers.Processor then produces the output packet of described encrypted packet, and wherein each output packet comprises the partial sequence that is used to resequence and derives from described full sequence numbers number.
According to another embodiment, a kind of equipment is described, it comprises at least one processor and memory.Processor at least one base station from wireless communication system receives bag, and wherein the bag that each received comprises the partial sequence that is used to resequence number.The described partial sequence that comprises in the bag that processor uses each to receive number is decrypted the bag of described reception.
According to another embodiment, a kind of equipment is described, it comprises at least one processor and memory.Processor receives the input bag from network entity, and wherein each input comprises the appended sequence number that the full sequence numbers that the input bag is encrypted is derived from being used for.Processor produces the output packet of described input bag, and wherein each output packet comprises the partial sequence that is used for resequencing and derives from the described appended sequence number of each input bag number.Processor then sends to subscriber equipment (UE) with output packet.
According to another embodiment, a kind of equipment is described, it comprises at least one processor and memory.Processor receives bag from UE, and wherein the bag that each received comprises the partial sequence that is used to resequence number.Processor number is resequenced to the bag that is received based on the partial sequence that comprises in the bag that each received.Processor then produces the described output packet of bag through rearrangement, and wherein each output packet comprises the appended sequence number that the partial sequence that is used for deciphering and comprises from the bag that each received number derives.Processor is forwarded to network entity with output packet.
According to another embodiment, a kind of equipment is described, it comprises at least one processor and memory.Processor receives the input bag from the higher level of RLC sublayer, and wherein each input comprises the sequence information of the order of indication input bag.Processor produces the output packet of described input bag, and the RLC sequence number of deriving each output packet based on the sequence information that comprises in each input bag.
According to another embodiment, a kind of equipment is described, it comprises at least one processor and memory.Processor with one group of redundancy packet send in a plurality of base stations each.Each bag in described group comprises different sequence numbers, and the duplicate packages that sends to a plurality of base stations comprises identical sequence number.
According to another embodiment, a kind of equipment is described, it comprises at least one processor and memory.Processor receives at least one bag, with the sequence number of described bag each bag is encrypted, and at each byte of each bag or at each bag sequence number is increased progressively.
Various aspects of the present invention and embodiment hereinafter are described in further detail.
Description of drawings
Fig. 1 shows the UE in the UMTS network.
Fig. 2 shows the protocol stack of UE, eNode B and IAD.
Fig. 3 A shows the encryption at reflector place.
Fig. 3 B shows the deciphering at receiver place.
Fig. 4 shows the downlink transmission of using independent Synchronizing Passwords (crypto-sync) and RLC sequence number.
Fig. 5 and 6 shows respectively and uses full sequence numbers to be used to encrypt down link and ul transmissions with RLC.
Fig. 7 displaying is used for initial encrypted process.
Fig. 8 shows the process that the reflector place carries out.
Fig. 9 shows the process that the receiver place carries out.
Figure 10 shows the process that is used for downlink transmission that eNode B place carries out.
Figure 11 shows the process that is used for ul transmissions that eNode B place carries out.
Figure 12 shows the block diagram of UE, eNode B and IAD.
Embodiment
This paper uses vocabulary " exemplary " expression " to serve as example, example or explanation ".Any embodiment that this paper is described as " exemplary " not necessarily is interpreted as more preferred or favourable than other embodiment.
Technology described herein can be used for various wireless communication systems, for example CDMA, TDMA, FDMA and OFDMA system.But one or more radiotechnicss such as cdma system embodiment such as wideband CDMA (W-CDMA), cdma2000.Cdma2000 is contained IS-2000, IS-856 and IS-95 standard.But the radiotechnics of tdma system embodiment such as global system for mobile communications (GSM).These various radiotechnicss and standard are known in this technology.In the document from " third generation partner program " tissue (3GPP) by name W-CDMA and GSM have been described.In the document from " third generation partner program 2 " tissue (3GPP2) by name cdma2000 has been described.For the sake of clarity, hereinafter specifically describe the technology of global mobile communication system (UMTS) network be used to utilize W-CDMA.Term " system " and " network " are used interchangeably usually.For the sake of clarity, the major part of below describing content is used the 3GPP term.
Fig. 1 shows the subscriber equipment (UE) 110 of communicating by letter with UMTS network 100.UE110 also can be described as mobile radio station, accesses terminal, subscriber station etc.UE 110 can be cellular phone, wireless device, PDA(Personal Digital Assistant), nextport modem card NextPort, or a certain miscellaneous equipment or device.
UMTS network 100 comprises the described network entity of 3GPP.UE 110 can communicate by letter with enhancing Node B (eNode B) 120 via the airlink connection.ENode B 120 can provide than regular node B strengthen functional, for example mobile management.ENode B 120 communicates by letter with the IAD (AGW) 130 that data, services is provided for UE 110.Data, services can be at bag data, ip voice (VoIP), video, information receiving and transmitting etc.IAD 130 can be the set of single network entity or network entity.For instance, IAD 130 can comprise one or more radio network controllers (RNC) known in this technology, Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN).IAD 130 can be coupled to core and/or data network 140 (for example, the internet), and can communicate by letter with other entity that is coupled to core/data network 140 (for example, distance host).
UMTS network 100 can be current service network of communicating by letter with UE 110.UE 110 can subscribe to local network.During UE 110 roamings, service network can be different from local network.Local network can comprise security centre 150 (for example, home environment/authentication center), and it is UE 110 storage security and other relevant information.
In other cordless communication network, available other title is called the network entity among Fig. 1.For instance, eNodeB 120 also can be described as base station, access point, base station transceiver etc.For 3GPP2, IAD 130 can comprise one or more mobile switching centres (MSC), Packet Control Function (PCF) and packet data serving node (PDSN).
Fig. 2 shows the example protocol stacks 200 that is used for carrying out via eNode B 120 between UE 110 and the IAD 130 data communication.Each entity is for to keep a protocol stack with communicating by letter of another entity.Each protocol stack comprises transport layer (Fig. 2 is not shown), network layer (L3), link layer (L2) and physical (L1) usually.UE 110 can use a certain other agreement at transmission control protocol (TCP), User Datagram Protoco (UDP) (UDP) or transport layer place to communicate by letter with distance host (Fig. 2 is not shown).UE 110 can use the Internet Protocol Version 4 (IPv4) at network layer place or IP version 6 (IPv6) to come swap data with IAD 130.Transport layer data (for example, at TCP and/or UDP) tunica is enclosed in the IP bag, the described IP bag of exchange between UE 110 and IAD 130.
Link layer depends on radio network technique usually.In the embodiment shown in Figure 2, the link layer of UE 110 is made up of bag data convergence protocol (PDCP), radio link control (RLC) and medium access control (MAC) three sublayers, and it carries out function described below.PDCP ends at IAD 130 places, and RLC and MAC end at eNode B120 place.UE 110 further communicates by letter with eNode B 120 via the W-CDMA air-link interface at physical layer place.ENode B 120 can communicate by letter with IAD 130 via the technology-dependent interface of link layer and physical layer.
Fig. 2 shows the example protocol stacks of the user plane of bearer service/bag data.For simplicity, the protocol stack of not showing the control plane of carrier signaling.For user plane protocol stack, in transmission path, each layer/sublayer receives service data unit (SDU) from next higher layer/sublayer, and is next lower layer/sublayer generation protocol Data Unit (PDU).The PDU that sends from given layer/sublayer is the SDU that receives in next lower layer/sublayer.For given layer/sublayer, may there be or may do not exist mapping one to one between the SDU of described layer and the PDU.In RX path, each layer/sublayer receives PDU from next lower layer/sublayer, and SDU is offered next higher layer/sublayer.
Agreement in the link layer can be through design to provide various functions.In general, given function may be implemented in in the described agreement any one.Yet, given function is implemented in the different agreement may causes Different Results.Hereinafter provide the specific embodiment of PDCP and RLC.
PDCP can provide following function:
Carry out the header compressed and the decompression of IP traffic (for example, at TCP/IP or RTP/UDP/IP header) at reflector and receiver place respectively; And
Carry out the encryption and decryption of data at reflector and receiver place respectively, obtain to prevent unwarranted data.
Encrypt and synonymous, and deciphering and synonymous.
RLC can provide following function:
With the PDU segmentation of variable-length upper layer with re-assembly to less RLC PDU/ comes segmentation with less RLC PDU and re-assemblies variable-length upper layer PDU, with the transmittability coupling of airlink;
Resequence so that the transmission in proper order of upper layer PDU to be provided at the receiver place;
Carry out the RLC PDU that duplicate detection repeats to receive with detection, and guarantee that each upper layer PDU only is passed to upper layer once; And
Carry out error correction by error of transmission again or the RLC PDU that misses receipts.
PDCP also can support different and/or extra function with RLC except the function that above provides.Available being entitled as " Technical Specification Group Radio Access Network is disclosed; Radio Interface ProtocolArchitecture " function that PDCP and RLC provide described among the 3GPP TS 25.301 in (version in September, 6,2005).
In the embodiment shown in Figure 2, PDCP ends at UE 110 and IAD 130 places, and RLC ends at UE 110 and eNode B 120 places.By carry out encryption and decryption at the PDCP place, can on whole UMTS network 100, send data safely.By making RLC end at eNode B 120 places but not IAD 130 places, RLC function (for example, transmission again) can be carried out quickly, and this can improve the performance of delay-sensitive application.
UE 110, IAD 130 and security centre 150 can carry out and authorize key agreement (AKA) program so that set up the secure data session between UE 110 and IAD 130.The AKA program is verified IAD 130 and security centres 150 to UE 110, and verifies UE 110 to IAD 130, and from security centre 150 encryption key is provided to IAD 130.UE 110 enough UE 110 of energy and all known user's specific secret key of security centre 150 produce described same cipher key.UE 110 can use encryption key swap data safely thereafter with IAD 130.Available being entitled as " Technical Specification Group Services and System Aspects is disclosed; 3G Security; Security architecture " the AKA program of 3GPP described among the 3GPPTS 33.102 in (version in December, 6,2005).
Fig. 3 A shows the encryption at reflector place, and described reflector can be UE 110 or can be IAD 130 for downlink transmission for ul transmissions.Unit 310 receives encryption key, full sequence number/crypto-sync, bearer identifier, direction position and length indicator.Unit 310 produces random keystream based on all inputs and according to the f8 cryptographic algorithm that is defined by 3 GPP.Full sequence number/crypto-sync is to increase progressively and serve as numeral for the time-varying input of cryptographic algorithm at each data byte or each bag.Bearer identifier is indicated the carrier of positive ciphered data.The direction position is for 130 ul transmissions is set to " 0 " from UE 110 to IAD, and is set to " 1 " for the downlink transmission from IAD 130 to UE 110.The length indicator indication is by the length of the key stream of unit 310 generations.XOR gate 312 is carried out input data bit and 2 additions of modulus by turn from the key stream of unit 310, and encrypted data bit is provided.
Fig. 3 B shows the deciphering at receiver place, and described receiver can be UE 110 or can be IAD 130 for ul transmissions for downlink transmission.Unit 350 receives encryption key, full sequence number/crypto-sync, bearer identifier, direction position and length indicator.Unit 350 produces random keystream based on all inputs and in the mode identical with the unit 310 at reflector place.XOR gate 352 is carried out encrypted data bit and 2 additions of modulus by turn from the key stream of unit 350, and provides through the decrypted data position.
Independent full sequence number/crypto-sync can be used for down link and ul transmissions, and can be by various entity generation/distribution.In one embodiment, UE 110 produces the full sequence numbers that is used for down link and ul transmissions.In another embodiment, reflector produces the full sequence numbers that is used for its link.In this embodiment, IAD 130 can produce the full sequence numbers of the downlink transmission that is used to arrive UE 110, and UE 110 can produce the full sequence numbers of the ul transmissions that is used to arrive IAD 130.In another embodiment, IAD 130 and a certain other network entity can produce the full sequence numbers that is used for down link and ul transmissions.Under any circumstance, the reflector of each link and receiver are all understood the full sequence numbers that is used for described link.
Can produce the full sequence number/crypto-sync that is used for each link in every way.In one embodiment, UE 110 stores Hyper Frame Number (HFN) and uses described HFN to produce the full sequence numbers that is used for each link.UE 110 can be set at HFN with the low live part that is used for the full sequence numbers of up link, and the higher live part of full sequence numbers can be set at predetermined value (all being zero for example).Can upgrade (for example, increasing progressively 2) HFN at each data call, make the different full sequence numbers of starting point be used for different callings.When calling out beginning, the full sequence numbers that is used for down link can be set at the full sequence numbers that equals to be used for up link.Yet, decide on the data volume that is just sending on each link, can two full sequence numbers be increased progressively different rates.Carry out described in can 3GPP TS 33.102 As mentioned above based on the generation of the Synchronizing Passwords of HFN and the renewal of HFN.
In another embodiment, the full sequence numbers that is used for each link is the numeral that produces at random.In another embodiment, the full sequence numbers that is used for each link is initialized as predetermined value (for example, zero) when encrypting beginning.In another embodiment, produce the full sequence numbers that is used for each link based on the identity of for example current system time, UE 110, the information such as identity of IAD 130.Can also produce the full sequence numbers that is used for each link by alternate manner.The full sequence numbers that is used for each link can be any length that superperformance can be provided (for example, 64,128 etc.).
RLC can support affirmation mode (AM) and Unacknowledged Mode (UM).In affirmation mode, when the Negative Acknowledgement (NAK) that receives PDU, reflector is carried out the transmission again of RLC PDU.In Unacknowledged Mode, receiver does not send NAK, and reflector is not carried out transmission again.For two kinds of patterns, each RLC PDU comprises the RLC header that contains the RLC sequence number.The RLC sequence number can be used by receiver, is used for the various purposes such as RLC PDU of for example the RLC PDU that is received being resequenced, detecting repetition and loses.Different RLC sequence numbers can be used for each RLC example, for example each RLC stream.For each RLC example, the RLC sequence number can be initialized as predetermined value (for example, zero), and can increase progressively 1 at each RLC PDU, each data byte or a certain other data volume thereafter.
Fig. 4 shows the embodiment of the process 400 of the downlink transmission of using independent Synchronizing Passwords and RLC sequence number.In example shown in Figure 4, originally UE 110 communicates by letter with eNode B 120a, receives bag A and B from eNode B 120a on down link, is handed over to eNode B 120b from eNode B 120a, and receives extra bag C and D from eNode B 120b.
For the sake of clarity, Fig. 4 only shows PDCP and the RLP function that UE 110, eNode B 120a are relevant with 120b and IAD 130 places.IAD 130 (for example) receives the bag that is sent to UE 110 from distance host.IAD 130 can be carried out header compressed to reduce the header of the agreement in the higher level to each bag.In general, can enable or forbid header compressed at IAD 130 places.For the sake of clarity, below describe supposition and enable header compressed.IAD 130 then each is carried out through the bag of header compressed and encrypts (for example, as shown in Figure 3A), to produce encrypted packet.Each encrypted packet can be including (for example) through header, the encrypted pay(useful) load of ciphered compressed be used for Synchronizing Passwords that described bag is encrypted.In Fig. 4, the header and the encrypted pay(useful) load through ciphered compressed of each bag are expressed as " Pkt ", and Synchronizing Passwords is expressed as " CS ".In example shown in Figure 4, IAD 130 receives four bag A, B, C and D (can be based on order with this UE 110), handle each bag that receives to produce encrypted packet, encrypted packet A and B are forwarded to eNode B 120a, and then encrypted packet C and D are forwarded to eNode B 120b.
ENode B 120a receives encrypted packet A and B from IAD 130, and the RLC header is appended to each encrypted packet.The RLC header of each encrypted packet comprises the RLC sequence number of that bag, and it is expressed as " SN " in Fig. 4.The RLC sequence number is increased progressively, make UE 110 can determine to wrap B and following bag A.Similarly, eNode B 120b receives encrypted packet C and D from IAD 130, and RLC header and RLC sequence number are appended to each encrypted packet.If the RLC example moves to eNode B 120b from eNode B 120a when UE110 is handed over to eNode B 120b, eNodeB 120b can use the extendible portion of the RLC sequence number that is used by eNode B 120a so.If the RLC example does not move to eNode B 120b, eNode B 120b can begin new RLC sequence number so.Under any circumstance, UE 110 can determine that based on RLC sequence number and/or handover information bag C and D are following bag B.
UE 110 receives encrypted packet A and B from eNode B 120a, and the RLC sequence number that comprises in wrapping based on each is resequenced with suitably inferior these bags of ordered pair, and removes the RLC sequence number in each bag.UE 110 resequences with suitably inferior these bags of ordered pair also from eNode B120b reception encrypted packet C and D, and removes the RLC sequence number in each bag.UE 110 uses the Synchronizing Passwords that comprises in each encrypted packet that described bag is carried out deciphering (for example, shown in Fig. 3 B), to obtain decrypted packet.If 130 places have carried out header compressed at IAD, UE 110 also carries out header decompression so, to obtain the bag through decompressing.UE 110 can carry out rearrangement, deciphering and decompress when receiving bag, and suitably order is provided to higher level with the bag through decompressing.
Fig. 5 shows and uses full sequence numbers to be used to encrypt embodiment with the process 500 of the downlink transmission of RLC.In this embodiment, at the Synchronizing Passwords that is used to encrypt be used to resequence and the RLC sequence number of other function utilizes full sequence numbers.
IAD 130 receives the bag that is sent to UE 110, and each bag is carried out header compressed, and with full sequence numbers the compressed bag of each header is carried out encryption to produce encrypted packet.In example shown in Figure 5, IAD 130 pack processing A are forwarded to eNode B 120a to D with encrypted packet A and B, and encrypted packet C and D are forwarded to eNode B 120b.Each encrypted packet can be including (for example) through the header of ciphered compressed, encrypted pay(useful) load and appended sequence number (it be expressed as " SN " in Fig. 5).Appended sequence number can be the low live part of full sequence numbers or full sequence numbers.
ENode B 120a receives encrypted packet A and B from IAD 130, and re-uses appended sequence number in each bag as the RLC sequence number of described bag.Similarly, eNode B 120b receives encrypted packet C and D from IAD 130, and re-uses appended sequence number in each bag as the RLC sequence number of described bag.ENode B 120a and 120b can (for example) compress appended sequence number in each bag by the least significant bit (LSB) that only keeps predetermined number, and partial sequence number can be appended to described bag.Partial sequence number is as the RLC sequence number, and can equal the appended sequence number that receives from IAD 130 or the low live part of appended sequence number.Full sequence numbers is increased progressively, make UE 110 to determine the order of bag A based on the RLC sequence number that comprises in each bag that sends by eNode B 120a and 120b to D.
UE 110 receives encrypted packet A and B from eNode B 120a, and receives encrypted packet C and D from eNode B 120b.UE 110 resequences with suitably inferior these bags of ordered pair based on the RLC sequence number that comprises in each bag.UE 110 then decompresses obtaining the full sequence numbers of that bag to the RLC sequence number in each bag, and as Synchronizing Passwords each encrypted packet is carried out deciphering with full sequence numbers.UE 110 can carry out rearrangement, deciphering and decompress when receiving bag, and suitably order is provided to higher level with the bag through decompressing.
For simplicity, Fig. 5 shows that each encrypted packet is used as the embodiment that a RLC PDU sends corresponding to a PDCP PDU and each PDCP PDU.In this embodiment, can be based at the appended sequence number of corresponding PDCP PDU and derive the RLC sequence number of each PDCP PDU.In another embodiment, RLC can carry out segmentation and and put, make in one or more RLC PDU, to send given PDCP PDU, and given RLC PDU can carry the data from one or more PDCP PDU.In this embodiment, can full sequence numbers be increased progressively, and each data byte then will be associated with different full sequence numbers at each data byte.The appended sequence number of each PDCP PDU can derive from the full sequence numbers at first data byte that PDCP PDU.Similarly, the RLC sequence number of each RLC PDU can be derived based on the full sequence numbers at first data byte among that RLC PDU.The RLC entity can be determined the RLC sequence number of each RLC PDU based on the appended sequence number among each PDCP PDU and counted data byte.
Full sequence numbers can be by various entity and produced in every way, and is as indicated above.Full sequence numbers can be decomposed into HFN and RLC sequence number, and is as indicated above.UE 110 and IAD 130 can be apprised of full sequence numbers or HFN (for example, encrypting to open the beginning) between the signaling commutation period, and can store full sequence numbers or HFN.The RLC sequence number can be included in from eNode B120 and send to each bag of UE 110.UE 110 can determine the full sequence numbers of described bag based on the RLC sequence number that comprises in the bag that each received and the HFN that is stored in UE 110 places.UE 110 and IAD 130 can each be kept a counter to calculate unrolling of RLC sequence number at HFN.In general, UE 110 can produce the full sequence numbers of described bag based on the low live part of the full sequence numbers of add in each bag and the higher live part that is stored in the full sequence numbers at UE place.
Full sequence numbers can be any size that superperformance can be provided (for example, 32,64,128 etc.).The part of whole full sequence numbers or full sequence numbers can append to each bag that sends to eNode B 120 from IAD 130.Because return bandwidth may be higher, so IAD 130 can send whole full sequence numbers.Yet in order to reduce the overhead in the aerial transmission course, eNode B 120 can be generally used for the appended sequence number boil down to size of RLC sequence number.In a particular embodiment, full sequence numbers be 128 long, forms by 18 to 128 LSB of full sequence numbers from the appended sequence number that IAD 130 sends to each bag of eNode B 120, and form from eNode B 120 sends to UE110 each part/RLC sequence number wrapping 6 to 18 LSB by full sequence numbers.In this embodiment, HFN can be 122 long to contain 6 situations that are used for the RLC sequence number.UE 110 can rebuild full sequence numbers based on required highest significant position (MSB) number of RLC sequence number and HFN.Other size also can be used for full sequence numbers, appended sequence number and part/RLC sequence number and HFN.
Can upgrade full sequence numbers in every way.In one embodiment, full sequence numbers increases progressively 1 at each bag, and each bag may have fixing or variable-size.In another embodiment, full sequence numbers increases progressively 1 at each data byte.In this embodiment, the full sequence numbers at inclusion tail place can be determined by the full sequence numbers of unwrapping the beginning place and bag size.Can also upgrade full sequence numbers by alternate manner.
Use single full sequence numbers to be used for encrypting and RLC can provide various advantages.At first, cause lower overhead as the RLC sequence number for each bag by the sequence number that will be used to encrypt once more.The second, make all bags that send by different e NodeB have the unique sequence space data forwarding program is become easily, and simplify between the handover period the synchronous of RLC sequence number space on the different e Node B.Because when when eNode B 120a switches to eNode B 120b, using identical sequence number space, so UE 110 can resequence the bag that receives from these eNode B clearly.This has been avoided RLC sequence number synchronization failure on the eNode B, and it can not detect at the RLC place.Yet, because the functional common expection bag of header decompression at PDCP place arrives successively to carry out proper handling, so the RLC synchronization failure can cause header decompression entity suitably not operate.
Use single full sequence numbers to be used for encrypting and RLC also can be of value to and pair broadcasting, be about to same data and be forwarded to a plurality of eNode B 120 from IAD 130.Broadcast operation for two, IAD 130 is forwarded to a plurality of eNodeB 120 with same group of bag.The eNode B of the current UE of serving 110 is transferred to UE with bag on down link, and the eNodeB of non-service abandons the bag that has been transmitted by the eNode B that serves.Two broadcasting can be used for reducing for for example delay of delay-sensitive data such as voice, recreation.If two broadcasting uses independently Synchronizing Passwords and RLC sequence number (for example in the process, as shown in Figure 4), so should be synchronous from participating in two RLC sequence numbers of broadcasting all eNode B of operation, at UE 110 places bag is suitably re-assemblied and resequence guaranteeing.Yet if use single full sequence numbers to be used for encrypting and RLC, so two RLC entities of broadcasting all eNode B places that relate in the operation can gratis have synchronous RLC sequence number.
Fig. 6 shows and uses full sequence numbers to be used to encrypt embodiment with the process 600 of the ul transmissions of RLC.In example shown in Figure 6, originally UE 110 communicates by letter with eNode B 120a, will wrap A and B and send to eNode B 120a on up link, is handed over to eNode B 120b from eNode B 120a, and extra bag C and D are sent to eNodeB 120b.
UE 110 carries out header compressed to each bag, and the compressed bag of each header is encrypted to produce encrypted packet.Each encrypted packet can be including (for example) header and the encrypted pay(useful) load through ciphered compressed.UE 110 appends to each encrypted packet with the RLC sequence number, and described RLC sequence number can be the LSB of the predetermined number of full sequence numbers.
ENode B 120a receives encrypted packet A and B from UE 110, resequences with suitably inferior these bags of ordered pair based on the RLC sequence number in each bag, and bag is forwarded to IAD 130.Similarly, eNode B 120b receives encrypted packet C and D from UE 110, resequences with suitably inferior these bags of ordered pair, and bag is forwarded to IAD 130.
IAD 130 decompresses to obtain the full sequence numbers of that bag to the RLC sequence number in each bag.IAD 130 then uses full sequence numbers as Synchronizing Passwords each encrypted packet to be decrypted.IAD 130 is also carried out header decompression, to obtain the bag through decompressing.IAD 130 can be carried out rearrangement, deciphering and decompress when receiving bag from eNode B 120, and the bag that decompresses can be forwarded to recipient's entity (for example, distance host).
Can various manners for uplink transmission carry out rearrangement.In one embodiment, each eNode B 120 detects the also transmission again of initial these bags of bag wrong and that lose.In this embodiment, eNode B may can not provide bag with suitable order owing to the UE mobility during handing over to eNode B 120b from eNode B120a.In particular, can not guarantee before from the bag of target eNode B 120b, to arrive IAD 130 from the bag of source eNode B 120a.IAD 130 then can be carried out rearrangement to the bag that receives from different eNode B.In another embodiment, target eNode B 120b carries out rearrangement, and will wrap and be provided to IAD 130 successively.In this embodiment, source eNode B 120a can be between the handover period be forwarded to its bag target eNode B 120b.For all embodiment, IAD 130 can be carried out the rearrangement (if necessary) of certain form to the bag that receives from different eNode B, to guarantee that these bags are delivered to header decompression entity successively.
Fig. 7 shows the embodiment that is used to open beginning encrypted process 700.Originally, UE 110, IAD 130, security centre 150 and control plane entity 160 are carried out the AKA program to verify IAD 130 and security centres 150 to UE 110, verify UE 110 to IAD 130, and encryption key is provided to IAD 130 (square frame 710).Control plane entity 160 can be the entity of encrypting for UE 110 controls, and can be positioned at IAD 130, eNode B 120 or a certain other network entity place.The request that control plane entity 160 will begin to encrypt sends to UE 110 (step 712).UE 110 receives request and can (for example) use the HFN that is stored in UE 110 places to produce the full sequence numbers that is used for down link and ul transmissions.UE 110 can return beginning encrypted validation (step 714).Affirmation can comprise the full sequence numbers (as shown in Figure 7) that is used for down link (DL) and up link (UL), higher live part, HFN and/or the out of Memory of each full sequence numbers.The beginning encrypting messages that control plane entity 160 then will comprise the information of the full sequence numbers that is used for down link and up link sends to IAD 130 (step 716).IAD 130 is recognized response (step 718).IAD 130 and the available thereafter encryption safe of UE 110 ground swap data (square frame 720).
Fig. 8 shows the embodiment of the process 800 that the reflector place carries out, and described reflector can be IAD 130 or can be UE 110 for ul transmissions for downlink transmission.To carrying out header compressed to obtain input bag (square frame 812) from the bag of higher level.The input bag is encrypted to obtain encrypted packet, wherein each input bag is encrypted (square frame 814) with full sequence numbers.Produce the output packet of described encrypted packet, wherein each output packet comprises the partial sequence number (square frame 816) that is used to resequence and derives from described full sequence numbers.Described full sequence numbers can be wrapped at each input, each byte of each bag etc. increases progressively.Described partial sequence number can be used as the sequence number of RLC, and can be used for rearrangement, duplicate detection, error correction and/or other function.
Can be each input packet generation output packet, in the case, the LSB of the predetermined number of available described full sequence numbers at corresponding input bag forms the described partial sequence number of each output packet.Perhaps, can and and put described encrypted packet execution segmentation to produce described output packet.Then based on the described partial sequence that derives each output packet at the described full sequence numbers of respective encrypted bag number.For instance, can described full sequence numbers be increased progressively, and can derive the partial sequence number of described output packet from full sequence numbers at first data byte that comprises each output packet at each byte.
Fig. 9 shows the embodiment of the process 900 that the receiver place carries out, and described receiver can be UE110 or can be IAD 130 for ul transmissions for downlink transmission.At least one base station from wireless communication system receives bag, and wherein the bag that each received comprises the partial sequence number (square frame 912) that is used to resequence.Can be based on the described partial sequence that comprises in the bag that each received number to the bag of described reception resequence (square frame 914).Can number detect the bag of losing based on the described partial sequence in the bag that each received, and can ask to transmit again the bag of losing.The described partial sequence that comprises in the bag that uses each to receive number is decrypted (square frame 916) to the bag of described reception.Can carry out header decompression (square frame 918) to bag through deciphering.
Do not re-assembly if carry out, can carry out deciphering to described reception bag in order to the full sequence numbers that the described partial sequence that comprises in the bag that each received number derives so.Can keep counter at the low live part of full sequence numbers.Then can use at the counter of the MSB of the predetermined number of described full sequence numbers with at the described partial sequence of the LSB of the predetermined number of described full sequence numbers and number derive the described full sequence numbers of each bag that receives.Then can described full sequence numbers as Synchronizing Passwords each being received bag is decrypted.
Re-assembly if carried out, can re-assembly to obtain output packet described reception bag so.Follow available based on receiving the described partial sequence number of bag and full sequence numbers that byte count derives is carried out deciphering to each output packet at corresponding.
Figure 10 shows the embodiment that is used for carrying out to UE 110 process 1000 of downlink transmission that eNode B place carries out.Receive the input bag from network entity (for example, IAD 130), wherein each input comprises the appended sequence number (square frame 1012) that derives from the full sequence numbers that is used for described input bag is encrypted.Produce the output packet of described input bag, wherein each output packet comprises the partial sequence number (square frame 1014) that is used for resequencing and derives from the described appended sequence number of each input bag.Then described output packet is sent to UE 110 (square frame 1016).Can carry out transmission again to the output packet that lose at described UE place.Can be based on the described partial sequence that comprises in each output packet number described output packet of losing of identification.
Can produce the output packet of each input bag.In the case, can derive the described partial sequence number of each output packet by compression at the described appended sequence number of corresponding input bag.Also can and and put the execution segmentation of input bag to produce described output packet.In the case, the described partial sequence that can derive each output packet number based on appended sequence number and byte count at corresponding input bag.
Figure 11 shows the embodiment that is used for carrying out from UE 110 process 1100 of ul transmissions that eNode B place carries out.Receive bag from UE 110, wherein the bag that each received comprises the partial sequence number (square frame 1112) that is used to resequence.Based on the described partial sequence that comprises in the bag that each received number to the bag of described reception resequence (square frame 1114).Can number detect the bag of losing based on the described partial sequence that comprises in the bag that each received, and can ask to transmit again the described bag of losing.Produce the described output packet of bag through rearrangement, wherein each output packet comprises the appended sequence number (square frame 1116) that the described partial sequence that is used for deciphering and comprises from the bag that each received number derives.Described output packet is forwarded to network entity (for example, IAD 130) (square frame 1118).
Figure 12 shows the block diagram of UE 110, eNode B 120 and IAD 130.On transmit direction, handle (for example, format, coding and staggered) by encoder 1212 and treat data and signaling, and further handle (for example, modulation, channelizing and scrambling) to produce the output chip by modulator (Mod) 1214 by UE 110 transmissions.Reflector (TMTR) 1222 is then regulated (for example, being converted to simulation, filtering, amplification and up-conversion) output chip and is produced uplink signal, and described uplink signal is via antenna 1224 emissions.On receive direction, the down link signal that antenna 1224 receives by eNode B emission.Receiver (RCVR) 1226 is regulated the signal that (for example, filtering, amplification, down converted and digitlization) receive from antenna 1224 and sample is provided.Demodulator (Demod) 1216 is handled (for example, descrambling, channelizing and demodulation) sample and the sign estimation value is provided.Decoder 1218 further handle (for example, release of an interleave and decoding) sign estimation value and provide through the decoding data.Encoder 1212, modulator 1214, demodulator 1216 and decoder 1218 can be implemented by modem processor 1210.Processing is carried out according to the employed radiotechnics of cordless communication network in these unit.
Controller/processor 1230 each unit of guiding are in the operation at UE 110 places.Controller/processor 1230 can be implemented among Fig. 2 the protocol stack at UE 110, but and process 900 and/or other process in the process in the execution graph 8 800, Fig. 9.Memory 1232 storages are at program code and the data of UE 110.Memory 1232 can be stored full sequence numbers, the HFN that is used for down link and up link and/or be used to encrypt and the out of Memory of RLC.
Figure 12 also shows the embodiment of eNode B 120, and described eNode B 120 comprises transceiver 1238, processor/controller 1240, memory (Mem) 1242 and (Comm) unit 1244 of communicating by letter.Transceiver 1238 provides the radio communication with UE110 and other UE.Processor/controller 1240 is carried out and is used for the various functions (for example, at RLC) of communicating by letter with UE, and can implement process 1000, the process 1100 among Figure 11 and/or other process among Figure 10.Memory 1242 storages are used for program code and the data of eNode B 120.Communication unit 1244 auxiliary with the communicating by letter of IAD 130.
Figure 12 also shows the embodiment of IAD 130, and described IAD 130 comprises processor/controller 1250, memory 1252 and communication unit 1254.Processor/controller 1250 is carried out the various functions that are used for communicating by letter with UE (for example, be used for PDCP and be used for the rearrangement of up link), and can implement process 800, the process 900 among Fig. 9 and/or other process among Fig. 8.Memory 1252 storages are used for the program code and the data of IAD 130.Memory 1252 can be stored full sequence numbers, the HFN that is used for down link and up link and/or be used to encrypt and the out of Memory of RLC.Communication unit 1254 auxiliary with the communicating by letter of eNode B 120.
Be understood by those skilled in the art that, can use multiple different technology and any one in the skill to come expression information and signal.For instance, can pass through voltage, electric current, electromagnetic wave, magnetic field or particle, light field or particle, or data, instruction, order, information, signal, position, symbol and the chip that may mention in the above whole description content represented in its any combination.
The technical staff will further understand, and the described various illustrative logical blocks of embodiment, module, circuit and the algorithm steps that disclose in conjunction with this paper can be embodied as electronic hardware, computer software, or both combinations.For this interchangeability of hardware and software clearly is described, above substantially according to the functional descriptions of various Illustrative components, block, module, circuit and step described various Illustrative components, block, module, circuit and step.This functional hardware that is embodied as still is that software depends on application-specific and the design constraint of forcing on whole system.Those skilled in the art can implement described functional at each application-specific by different way, but these implementation decisions should not be interpreted as causing and the departing from of the scope of the invention.
Available general processor, digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components or implement or carry out various illustrative logical blocks, module and the circuit of describing in conjunction with embodiments disclosed herein with its any combination of carrying out function described herein through design.General processor can be a microprocessor, but in replacement scheme, processor can be processor, controller, microcontroller or the state machine of any routine.Processor also can be embodied as the combination of calculation element, for example combination, a plurality of microprocessor of DSP and microprocessor, combine one or more microprocessors of DSP core or any other this type of configuration.
The method of describing in conjunction with embodiments disclosed herein or the step of algorithm can be embodied directly in the hardware, be implemented in the software module of being carried out by processor, or are implemented in described both combination.Software module can reside in the medium of any other form known in RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this technology.Exemplary storage medium is coupled to processor, makes that processor can be from read information and to the medium writing information.In alternative scheme, medium can be integral with processor.Processor and medium can reside among the ASIC.ASIC can reside in the user terminal.In alternative scheme, processor and medium can be used as discrete component and reside in the user terminal.
The those skilled in the art provide previous description to the embodiment that disclosed so that can make or use the present invention.The those skilled in the art will be easy to understand the various modifications to these embodiment, and under the situation that does not depart from the spirit or scope of the present invention, the General Principle that this paper defines can be applicable to other embodiment.Therefore, do not wish that the present invention is limited to the embodiment that this paper shows, but should meet principle and the corresponding to widest range of novel feature that discloses with this paper.

Claims (50)

1. equipment, it comprises:
At least one processor, it is configured to the input bag is encrypted to obtain encrypted packet, and produce the output packet of described encrypted packet, wherein each input bag is encrypted, and wherein each output packet comprises the partial sequence that is used to resequence and derives from described full sequence numbers number with full sequence numbers; And
Memory, it is coupled to described at least one processor.
2. equipment according to claim 1, wherein said partial sequence number is as the sequence number of radio link control (RLC).
3. equipment according to claim 1, wherein said at least one processor is configured to produce the output packet of each input bag, and with the least significant bit of the predetermined number of the described full sequence numbers of corresponding input bag with the described partial sequence that forms each output packet number.
4. equipment according to claim 1, wherein said at least one processor be configured to described encrypted packet carry out segmentation and and put producing described output packet, and derive the described partial sequence number of each output packet based on the described full sequence numbers of respective encrypted bag.
5. equipment according to claim 1, wherein said at least one processor are configured to increase progressively described full sequence numbers at each input bag.
6. equipment according to claim 1, wherein said at least one processor are configured to increase progressively described full sequence numbers at each byte of each input bag.
7. equipment according to claim 1, wherein said partial sequence number be used for to described output packet resequence, duplicate detection and error correction.
8. equipment according to claim 1, wherein said at least one processor are configured to receive the request of transmitting again by the bag of losing of the described partial sequence that comprises in each output packet number identification, the described bag of losing of new transmission of laying equal stress on.
9. method, it comprises:
The input bag is encrypted to obtain encrypted packet, each input bag is encrypted with full sequence numbers; And the output packet that produces described encrypted packet, each output packet comprises the partial sequence that is used to resequence and derives from described full sequence numbers number.
10. method according to claim 9, the described output packet of the described encrypted packet of wherein said generation comprises:
Produce the output packet of each input bag, and
With the least significant bit of the predetermined number of the described full sequence numbers of corresponding input bag with the described partial sequence that forms each output packet number.
11. method according to claim 9, the described output packet of the described encrypted packet of wherein said generation comprises:
To described encrypted packet carry out segmentation and and put producing described output packet, and
Derive the described partial sequence number of each output packet based on the described full sequence numbers of respective encrypted bag.
12. method according to claim 9, it further comprises:
Receive the request of transmitting again by the bag of losing of the described partial sequence that comprises in each output packet number identification; And
Again transmit the described bag of losing.
13. an equipment, it comprises:
Be used for the input bag is encrypted to obtain the device of encrypted packet, each input bag encrypted with full sequence numbers; And
Be used to produce the device of the output packet of described encrypted packet, each output packet comprises the partial sequence that is used to resequence and derives from described full sequence numbers number.
14. equipment according to claim 13, the wherein said device that is used to produce the described output packet of described encrypted packet comprises:
Be used to produce the device that each imports the output packet of bag, and
Be used for the device that least significant bit with the predetermined number of the described full sequence numbers of corresponding input bag forms the described partial sequence number of each output packet.
15. equipment according to claim 13, the wherein said device that is used to produce the described output packet of described encrypted packet comprises:
Be used for to described encrypted packet carry out segmentation and and put producing the device of described output packet, and
Being used for described full sequence numbers based on the respective encrypted bag derives the device of the described partial sequence number of each output packet.
16. equipment according to claim 13, it further comprises:
Be used for receiving the device of the request of the bag of losing that transmits the described partial sequence number identification that comprises by each output packet again; And
Be used for transmitting again the device of the described bag of losing.
17. an equipment, it comprises:
At least one processor, its at least one base station that is configured to from wireless communication system receives bag, the bag that each received comprises the partial sequence that is used to resequence number, and the described partial sequence that comprises in described at least one processor bag of being configured to use each to receive number is decrypted the bag of described reception; And memory, it is coupled to described at least one processor.
18. equipment according to claim 17, the described partial sequence that comprises in the bag that wherein said at least one processor is configured to receive based on each number is resequenced to the bag of described reception.
19. equipment according to claim 17, wherein said at least one processor is configured to the described partial sequence that comprises in the bag based on described reception and number derives the full sequence numbers of each bag that receives, and described full sequence numbers is decrypted the bag that each received as Synchronizing Passwords.
20. equipment according to claim 19, wherein said at least one processor is configured to keep the counter of the higher live part of described full sequence numbers, and uses the described partial sequence of least significant bit of the predetermined number of the counter of highest significant position of predetermined number of described full sequence numbers and described full sequence numbers number to derive the described full sequence numbers of each bag that receives.
21. equipment according to claim 17, wherein said at least one processor is configured to the bag execution of described reception is re-assemblied to obtain output packet, number derive the full sequence numbers of each output packet based on the described partial sequence of the corresponding bag that receives, and described full sequence numbers is decrypted each output packet as Synchronizing Passwords.
22. equipment according to claim 17, the described partial sequence that comprises in the bag that wherein said at least one processor is configured to receive based on each number detect the bag of losing, and the described bag of losing is transmitted in request again.
23. equipment according to claim 17, wherein said partial sequence number is as the sequence number of radio link control (RLC).
24. equipment according to claim 17, the described partial sequence that comprises in the bag that wherein said at least one processor is configured to receive based on each number execution rearrangement, duplicate detection and error correction.
25. equipment according to claim 17, wherein said at least one processor are configured to decrypted packet is carried out header decompression.
26. a method, it comprises:
At least one base station from wireless communication system receives bag, and the bag that each received comprises the partial sequence that is used to resequence number; And
The described partial sequence that comprises in the bag that uses each to receive number is decrypted the bag of described reception.
27. method according to claim 26, it further comprises:
Number the bag of described reception is resequenced based on the described partial sequence that comprises in the bag that each received.
28. method according to claim 26, wherein said bag to described reception is decrypted and comprises:
The described partial sequence that comprises in the bag based on described reception number derives the full sequence numbers of each bag that receives, and
Described full sequence numbers is decrypted the bag that each received as Synchronizing Passwords.
29. method according to claim 26, it further comprises:
Bag execution to described reception re-assemblies to obtain output packet; And
Wherein said bag to described reception is decrypted and comprises
Number derive the full sequence numbers of each output packet based on the described partial sequence of the corresponding bag that receives, and
Described full sequence numbers is decrypted each output packet as Synchronizing Passwords.
30. method according to claim 26, it further comprises:
Number detect the bag of losing based on the described partial sequence that comprises in the bag that each received, and the described bag of losing is transmitted in request again.
31. an equipment, it comprises:
Be used for receiving from least one base station of wireless communication system the device of bag, the bag that each received comprises the partial sequence that is used to resequence number; And
The device that the described partial sequence that the bag that is used for using each to receive comprises number is decrypted the bag of described reception.
32. equipment according to claim 31, it further comprises:
The device that the described partial sequence that the bag that is used for receiving based on each comprises number is resequenced to the bag of described reception.
33. equipment according to claim 31, the device that the wherein said bag that is used for described reception is decrypted comprises:
Be used for the device that described partial sequence that the bag based on described reception comprises number derives the full sequence numbers of each bag that receives, and
Be used for device that described full sequence numbers is decrypted the bag that each received as Synchronizing Passwords.
34. equipment according to claim 31, it further comprises:
Be used for the bag of described reception is carried out the device that re-assemblies with the acquisition output packet; And
The device that the wherein said bag that is used for described reception is decrypted comprises
Be used for the device of number deriving the full sequence numbers of each output packet based on the described partial sequence of the corresponding bag that receives, and
Be used for device that described full sequence numbers is decrypted each output packet as Synchronizing Passwords.
35. equipment according to claim 31, it further comprises:
The described partial sequence that the bag that is used for receiving based on each comprises number detects the device of the bag of losing, and the device that is used to ask to transmit again the described bag of losing.
36. an equipment, it comprises:
At least one processor, it is configured to receive the input bag from network entity, produce the output packet of described input bag, and described output packet sent to subscriber equipment (UE), wherein each input comprises the appended sequence number that full sequence numbers derived of described input bag being encrypted from being used for, and wherein each output packet comprises and is used for resequencing and from the partial sequence that described appended sequence number derived of each input bag number; And memory, it is coupled to described at least one processor.
37. equipment according to claim 36, wherein said at least one processor are configured to produce the output packet of each input bag, and derive the described partial sequence number of each output packet by the described appended sequence number of compressing described input bag.
38. equipment according to claim 36, wherein said at least one processor are configured to the output packet of losing at described UE place is carried out transmission again, wherein based on the described partial sequence that comprises in each output packet number described output packet of losing of identification.
39. a method, it comprises:
Receive the input bag from network entity, each input comprises the appended sequence number that full sequence numbers derived of described input bag being encrypted from being used for;
Produce the output packet of described input bag, each output packet comprises and is used for resequencing and from the partial sequence that described appended sequence number derived of each input bag number; And described output packet sent to subscriber equipment (UE).
40. according to the described method of claim 39, the described output packet of the described input bag of wherein said generation comprises:
Produce the output packet of each input bag, and
Derive the described partial sequence number of each output packet by the described appended sequence number of compressing described input bag.
41. an equipment, it comprises:
At least one processor, it is configured to receive bag from subscriber equipment (UE), number the bag of described reception is resequenced based on the partial sequence that comprises in the bag that each received, produce the output packet of described bag through resequencing, and described output packet is forwarded to network entity, wherein each output packet comprises the appended sequence number that the described partial sequence that is used for deciphering and comprises from the bag that each received number is derived; And
Memory, it is coupled to described at least one processor.
42. according to the described equipment of claim 41, the described partial sequence that comprises in the bag that wherein said at least one processor is configured to receive based on each number detects the bag of losing, and the described bag of losing is transmitted in request again.
43. a method, it comprises:
Receive bag from subscriber equipment (UE), the bag that each received comprises the partial sequence that is used to resequence number;
Number the bag of described reception is resequenced based on the described partial sequence that comprises in the bag that each received; Produce the described output packet of bag through rearrangement, each output packet comprises the appended sequence number that the described partial sequence that is used for deciphering and comprises from the bag that each received number derives; And
Described output packet is forwarded to network entity.
44. according to the described method of claim 43, it further comprises:
Number detect the bag of losing based on the described partial sequence that comprises in the bag that each received; And the described bag of losing is transmitted in request again.
45. an equipment, it comprises:
At least one processor, it is configured to receive the input bag from the higher level of radio link control (RLC) sublayer, produce the output packet of described input bag, and the RLC sequence number of deriving each output packet based on sequence information that comprise and that indicate the order of described input bag in each input bag, wherein the described RLC sequence number of each output packet is used for rearrangement; And
Memory, it is coupled to described at least one processor.
46. according to the described equipment of claim 45, wherein the described sequence information of each input bag is used as Synchronizing Passwords so that described input bag is decrypted.
47. an equipment, it comprises:
At least one processor, its be configured to one group of redundancy packet send in a plurality of base stations each, each bag in wherein said group comprises different sequence numbers, and the duplicate packages that wherein sends to described a plurality of base stations comprises identical sequence number; And
Memory, it is coupled to described at least one processor.
48. according to the described equipment of claim 47, each bag in wherein said group comprises different partial sequence number, and
The full sequence numbers of each bag was encrypted each bag with the described full sequence numbers of described bag during wherein said at least one processor was configured to determine described group, and determined the described partial sequence number of each bag based on the described full sequence numbers of described bag.
49. according to the described equipment of claim 47, wherein the described sequence number that comprises in each bag is as the sequence number of radio link control (RLC).
50. an equipment, it comprises:
At least one processor, it is configured to receive at least one bag, with the sequence number of described bag each bag is encrypted, and is increased progressively described sequence number at each byte of each bag or at each bag; And
Memory, it is coupled to described at least one processor.
CN2006800219296A 2005-04-26 2006-04-26 Ciphering and re-ordering packets in a wireless communication system Active CN101199158B (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US67527705P 2005-04-26 2005-04-26
US60/675,277 2005-04-26
US78487606P 2006-03-21 2006-03-21
US60/784,876 2006-03-21
US11/411,574 US8228917B2 (en) 2005-04-26 2006-04-25 Method and apparatus for ciphering and re-ordering packets in a wireless communication system
US11/411,574 2006-04-25
PCT/US2006/016065 WO2006116620A2 (en) 2005-04-26 2006-04-26 Ciphering and re-ordering packets in a wireless communication system

Publications (2)

Publication Number Publication Date
CN101199158A true CN101199158A (en) 2008-06-11
CN101199158B CN101199158B (en) 2012-06-20

Family

ID=36790893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006800219296A Active CN101199158B (en) 2005-04-26 2006-04-26 Ciphering and re-ordering packets in a wireless communication system

Country Status (6)

Country Link
US (1) US8228917B2 (en)
EP (3) EP3217592A1 (en)
JP (3) JP2008539678A (en)
KR (1) KR100965007B1 (en)
CN (1) CN101199158B (en)
WO (1) WO2006116620A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102348203A (en) * 2010-07-29 2012-02-08 普天信息技术研究院有限公司 Method for realizing encryption synchronization
WO2014101214A1 (en) * 2012-12-31 2014-07-03 华为技术有限公司 Decoding method and device
CN104272796A (en) * 2012-03-17 2015-01-07 黑莓有限公司 Handling packet data convergence protocol data units
CN110324115A (en) * 2019-06-10 2019-10-11 普联技术有限公司 A kind of data transmission method, device, storage medium and terminal device
CN111278031A (en) * 2017-08-11 2020-06-12 华为技术有限公司 PDU type setting method, UE strategy setting method and related entity
WO2022135498A1 (en) * 2020-12-25 2022-06-30 华为技术有限公司 Method, apparatus and system for securely transmitting data

Families Citing this family (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8165104B2 (en) * 2004-12-08 2012-04-24 Qualcomm Incorporated Methods and systems for enhancing local repair in robust header compression
US7733867B2 (en) * 2005-08-26 2010-06-08 Alcatel-Lucent Usa Inc. Header compression for real time internet applications
JP2007201973A (en) * 2006-01-30 2007-08-09 Kyocera Corp Data transmission reception system, encrypted information sharing method, data transmission apparatus, and data reception apparatus
TWI335739B (en) * 2006-02-06 2011-01-01 Lg Electronics Inc Methods for communicating between a network and user equipment
JP4778342B2 (en) * 2006-03-27 2011-09-21 富士通株式会社 Wireless communication method, wireless communication system, terminal, and base station
JP4729000B2 (en) * 2006-04-27 2011-07-20 イノヴァティヴ ソニック リミテッド Method and apparatus for synchronizing decoding parameters in a wireless communication system
WO2007126192A1 (en) * 2006-05-02 2007-11-08 Lg Electronics Inc. Data transmission method in mobile communications system
US7948989B2 (en) * 2006-05-04 2011-05-24 Qualcomm, Incorporated Methods and systems for enhancing local repair in robust header compression
WO2007148634A1 (en) * 2006-06-20 2007-12-27 Ntt Docomo, Inc. User device, base station, and method used in mobile communication system
US8208474B2 (en) * 2006-07-31 2012-06-26 Samsung Electronics Co., Ltd Method and apparatus for transmitting/receiving packet in a mobile communication system
CN100584093C (en) * 2006-08-15 2010-01-20 华为技术有限公司 A method and system transferring user device in mobile communication system
JP4923849B2 (en) * 2006-08-21 2012-04-25 富士通株式会社 Wireless receiver
KR101265643B1 (en) * 2006-08-22 2013-05-22 엘지전자 주식회사 A mothod of executing handover and controlling thereof in mobile communication system
TW200816700A (en) * 2006-09-29 2008-04-01 Interdigital Tech Corp Method and apparatus of adaptive sequence numbering in a wireless communication system
WO2008041823A2 (en) 2006-10-02 2008-04-10 Lg Electronics Inc. Methods for transmitting and receiving paging message in wireless communication system
KR100938754B1 (en) 2006-10-30 2010-01-26 엘지전자 주식회사 Data transmission method and data receiving method using discontinuous reception
WO2008054119A2 (en) * 2006-10-30 2008-05-08 Lg Electronics Inc. Methods for transmitting access channel message and response message, and mobile communication terminals
EP2084928B1 (en) * 2006-10-30 2017-08-23 LG Electronics Inc. Method of performing random access in a wireless communication system
GB0700750D0 (en) * 2007-01-15 2007-02-21 Samsung Electronics Co Ltd Mobile communications
US20080226074A1 (en) * 2007-03-15 2008-09-18 Interdigital Technology Corporation Method and apparatus for ciphering packet units in wireless communications
US8687495B2 (en) * 2007-03-16 2014-04-01 Qualcomm Incorporated Method and apparatus for polling in a wireless communication system
US8619752B2 (en) 2007-03-16 2013-12-31 Qualcomm Incorporated Method and apparatus for polling in a wireless communication system
KR101435832B1 (en) * 2007-03-19 2014-08-29 엘지전자 주식회사 Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
WO2008117346A1 (en) * 2007-03-22 2008-10-02 Fujitsu Limited Base station, mobile station, communication system and reordering method thereof
CN101047437B (en) * 2007-03-23 2012-12-19 中兴通讯股份有限公司 Method for controlling serial number synchronization for radio link and radio network controller
US8265628B2 (en) * 2007-04-25 2012-09-11 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for seamless handover in a wireless communication network
US8818375B2 (en) 2007-04-25 2014-08-26 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for seamless handover in a wireless communication network
EP2528385B1 (en) * 2007-04-26 2022-03-30 Fujitsu Limited Mobile station with packet reordering function
WO2008133481A1 (en) * 2007-04-30 2008-11-06 Lg Electronics Inc. Method for performing an authentication of entities during establishment of wireless call connection
KR101386812B1 (en) * 2007-04-30 2014-04-29 엘지전자 주식회사 Methods for transmitting or receiving data unit(s) using a header field existence indicator
KR101469281B1 (en) 2007-04-30 2014-12-04 엘지전자 주식회사 Method for state transition of mobile terminal
KR101464748B1 (en) 2007-04-30 2014-11-24 엘지전자 주식회사 Method for triggering a measurement report of mobile terminal
KR101458641B1 (en) 2007-04-30 2014-11-05 엘지전자 주식회사 Method of transmitting data in wireless communication system supporting multimedia broadcast/multicast service
US8274939B2 (en) 2007-04-30 2012-09-25 Lg Electronics Inc. Method of transmitting data block in wireless communication system
KR101455999B1 (en) 2007-04-30 2014-11-03 엘지전자 주식회사 Methods of generating data blocks in wireless communication system
KR20080097338A (en) * 2007-05-01 2008-11-05 엘지전자 주식회사 Discontinuous data transmittion/reception method
US8358669B2 (en) * 2007-05-01 2013-01-22 Qualcomm Incorporated Ciphering sequence number for an adjacent layer protocol in data packet communications
US20080273482A1 (en) * 2007-05-02 2008-11-06 Lg Electronics Inc. Uplink access method for receiving a point-to-multipoint service
KR100917205B1 (en) * 2007-05-02 2009-09-15 엘지전자 주식회사 Method of configuring a data block in wireless communication system
US8331399B2 (en) 2007-05-07 2012-12-11 Qualcomm Incorporated Re-using sequence number by multiple protocols for wireless communication
US8423789B1 (en) 2007-05-22 2013-04-16 Marvell International Ltd. Key generation techniques
KR101341515B1 (en) 2007-06-18 2013-12-16 엘지전자 주식회사 Method of updating repeatedly-transmitted information in wireless communicaiton system
WO2008156308A2 (en) * 2007-06-18 2008-12-24 Lg Electronics Inc. Paging information transmission method for effective call setup
HUE033683T2 (en) 2007-06-18 2017-12-28 Lg Electronics Inc Method and user equipment for performing uplink synchronization in wireless communication system
KR101486352B1 (en) 2007-06-18 2015-01-26 엘지전자 주식회사 Method of controlling uplink synchronization state at a user equipment in a mobile communication system
WO2008156314A2 (en) 2007-06-20 2008-12-24 Lg Electronics Inc. Effective system information reception method
WO2009009532A2 (en) * 2007-07-11 2009-01-15 Interdigital Technology Corporation Packet data convergence protocol operations
WO2009018318A2 (en) * 2007-08-02 2009-02-05 Interdigital Patent Holdings, Inc. Packet data convergence protocol procedures
KR101392697B1 (en) 2007-08-10 2014-05-19 엘지전자 주식회사 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
KR101467789B1 (en) 2007-08-10 2014-12-03 엘지전자 주식회사 A control method for uplink connection of idle terminal
KR101490253B1 (en) 2007-08-10 2015-02-05 엘지전자 주식회사 Method of transmitting and receiving control information in a wireless communication system
US9008006B2 (en) 2007-08-10 2015-04-14 Lg Electronics Inc. Random access method for multimedia broadcast multicast service(MBMS)
KR101514841B1 (en) 2007-08-10 2015-04-23 엘지전자 주식회사 Method for re-attempting a random access effectively
US8437739B2 (en) * 2007-08-20 2013-05-07 Qualcomm Incorporated Method and apparatus for generating a cryptosync
PL2191608T3 (en) 2007-09-17 2012-01-31 Ericsson Telefon Ab L M Method and arrangement in a telecommunication system
KR101435844B1 (en) 2007-09-18 2014-08-29 엘지전자 주식회사 Method of transmitting a data block in a wireless communication system
KR101513033B1 (en) 2007-09-18 2015-04-17 엘지전자 주식회사 A method for qos guarantees in a multilayer structure
KR101591824B1 (en) 2007-09-18 2016-02-04 엘지전자 주식회사 Method of performing polling procedure in a wireless communication system
KR101387537B1 (en) * 2007-09-20 2014-04-21 엘지전자 주식회사 A method for handling correctly received but header compression failed packets
US8687565B2 (en) 2007-09-20 2014-04-01 Lg Electronics Inc. Method of effectively transmitting radio resource allocation request in mobile communication system
TWM357138U (en) 2007-09-28 2009-05-11 Interdigital Patent Holdings Wireless transmit receive unit
KR100995962B1 (en) * 2007-10-22 2010-11-22 이노베이티브 소닉 리미티드 Method and apparatus of handling data decryption for a packet data convergence protocol layer in a wireless communication system
KR20090041323A (en) 2007-10-23 2009-04-28 엘지전자 주식회사 Method of effectively transmitting identification information of terminal during the generation of data block
KR20090043465A (en) 2007-10-29 2009-05-06 엘지전자 주식회사 A method for repairing an error depending on a radio bearer type
JP4940117B2 (en) 2007-12-06 2012-05-30 株式会社東芝 Mobile communication system, gateway device thereof, concentrator, and handover control method
US8958411B2 (en) 2008-03-17 2015-02-17 Lg Electronics Inc. Method of transmitting RLC data
KR101163275B1 (en) 2008-03-17 2012-07-05 엘지전자 주식회사 Method for transmitting pdcp status report
US20090238116A1 (en) * 2008-03-21 2009-09-24 Qual Comm Incorporated Method and apparatus for media access control -based fast cell switching for high-speed packet access
JP5157652B2 (en) 2008-06-03 2013-03-06 富士通株式会社 Mobile communication system
CN101651536A (en) * 2008-08-13 2010-02-17 中兴通讯股份有限公司 Method and system for realizing synchronization of control sequence numbers
KR100906098B1 (en) * 2008-12-02 2009-07-06 엠티에이치 주식회사 Communication method and device in communication system and recording medium for performing the method
US8515341B2 (en) * 2009-03-31 2013-08-20 Panasonic Corporation Relay station apparatus and relay method
US8774190B2 (en) * 2010-02-08 2014-07-08 Qualcomm Incorporated Enhanced resequencing of data received over a wireless communication system
US8379855B2 (en) * 2010-06-03 2013-02-19 Nokia Corporation Ciphering in a packet-switched telecommunications system
KR20120130419A (en) * 2011-05-23 2012-12-03 삼성전자주식회사 Apparatus and method for error correction ciphering in mobile communication system
US9019843B2 (en) * 2012-09-13 2015-04-28 International Business Machines Corporation Utilizing stored data to reduce packet data loss in a mobile data network with data breakout at the edge
CN103945371B (en) * 2013-01-17 2018-07-06 中国普天信息产业股份有限公司 A kind of method that End to End Encryption synchronizes
US20150124646A1 (en) * 2013-11-01 2015-05-07 Electronics And Telecommunications Research Institute Device-to-device communication method and apparatus
WO2015177846A1 (en) * 2014-05-19 2015-11-26 富士通株式会社 Base station apparatus and system
US10455414B2 (en) * 2014-10-29 2019-10-22 Qualcomm Incorporated User-plane security for next generation cellular networks
JP5870436B1 (en) * 2014-11-21 2016-03-01 パナソニックIpマネジメント株式会社 Wireless communication apparatus and wireless communication method
US9832096B2 (en) 2015-07-07 2017-11-28 International Business Machines Corporation Monitoring of computer network performance
WO2017182704A1 (en) * 2016-04-19 2017-10-26 Nokia Technologies Oy Reusing pdcp sn at rlc in multi-connectivity environment
US10356830B2 (en) * 2017-01-17 2019-07-16 Cisco Technology, Inc. System and method to facilitate stateless serving gateway operations in a network environment
JP7000450B2 (en) * 2017-03-24 2022-01-19 テレフオンアクチーボラゲット エルエム エリクソン(パブル) Systems and methods for removing duplicate packets for transmission
JP7148435B2 (en) * 2019-02-26 2022-10-05 株式会社日立製作所 Packet communication system and method
CN115606243A (en) * 2021-04-01 2023-01-13 苹果公司(Us) Integrated access and backhaul radio link switching

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4965825A (en) * 1981-11-03 1990-10-23 The Personalized Mass Media Corporation Signal processing apparatus and methods
US6094575A (en) * 1993-11-01 2000-07-25 Omnipoint Corporation Communication system and method
BR9504991A (en) * 1994-11-24 1997-10-14 Nec Corp Base station mobile communication system for use in a base control station communication system for use in a mobile communication system Mobile station for use in a mobile communication system and interface conversion unit for use in a mobile communication system
US5786837A (en) * 1994-11-29 1998-07-28 Agfa-Gevaert N.V. Method and apparatus for thermal printing with voltage-drop compensation
US7040838B2 (en) * 1999-08-27 2006-05-09 Kristar Enterprises, Inc. High capacity catch basin filtration system with adjustable deflector ring
US6980658B1 (en) 1999-09-30 2005-12-27 Qualcomm Incorporated Method and apparatus for encrypting transmissions in a communication system
KR100915745B1 (en) * 1999-09-30 2009-09-04 콸콤 인코포레이티드 Method and apparatus for encrypting transmissions in a communication system
US7003114B1 (en) 2000-01-20 2006-02-21 Qualcomm Incorporated Method and apparatus for achieving crypto-synchronization in a packet data communication system
FR2809576B1 (en) * 2000-05-23 2002-11-15 Nortel Matra Cellular METHOD FOR CONTROLLING A CHANNEL BETWEEN A RADIO TERMINAL AND A CELLULAR RADIO COMMUNICATION INFRASTRUCTURE, AND ACCESS NETWORK IMPLEMENTING SUCH A METHOD
US6870932B2 (en) * 2001-05-07 2005-03-22 Asustek Computer Inc. Frame number identification and ciphering activation time synchronization for a wireless communications protocol
US7006628B2 (en) 2002-01-04 2006-02-28 Avaya Technology Corp. Efficient packet encryption method
US8218768B2 (en) 2002-01-14 2012-07-10 Qualcomm Incorporated Cryptosync design for a wireless communication system
US7280531B2 (en) * 2002-04-29 2007-10-09 Iwatsu Electric Co., Ltd. Telephone communication system
US20030210714A1 (en) * 2002-05-10 2003-11-13 Chih-Hsiang Wu Method for avoiding loss of pdcp pdus in a wireless communications system
DE10252533A1 (en) * 2002-11-08 2004-05-27 Philips Intellectual Property & Standards Gmbh Transmission method of data packets from transmitter to receiver, involves retransmission of selected left over data packets in another container during transmission abortion
US8804761B2 (en) * 2003-08-21 2014-08-12 Qualcomm Incorporated Methods for seamless delivery of broadcast and multicast content across cell borders and/or between different transmission schemes and related apparatus
US20060069857A1 (en) * 2004-09-24 2006-03-30 Nec Laboratories America, Inc. Compression system and method
US7817628B2 (en) * 2004-11-15 2010-10-19 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for header compression with transmission of context information dependent upon media characteristic

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102348203A (en) * 2010-07-29 2012-02-08 普天信息技术研究院有限公司 Method for realizing encryption synchronization
CN102348203B (en) * 2010-07-29 2014-05-14 普天信息技术研究院有限公司 Method for realizing encryption synchronization
CN104272796A (en) * 2012-03-17 2015-01-07 黑莓有限公司 Handling packet data convergence protocol data units
WO2014101214A1 (en) * 2012-12-31 2014-07-03 华为技术有限公司 Decoding method and device
US10912018B2 (en) 2017-08-11 2021-02-02 Huawei Technologies Co., Ltd. PDU type setting method, UE policy setting method, and related entity
CN111278031A (en) * 2017-08-11 2020-06-12 华为技术有限公司 PDU type setting method, UE strategy setting method and related entity
CN111278031B (en) * 2017-08-11 2021-04-13 华为技术有限公司 PDU type setting method, UE strategy setting method, entity and storage medium
US11716680B2 (en) 2017-08-11 2023-08-01 Huawei Technologies Co., Ltd. PDU type setting method, UE policy setting method, and related entity
CN110324115A (en) * 2019-06-10 2019-10-11 普联技术有限公司 A kind of data transmission method, device, storage medium and terminal device
CN110324115B (en) * 2019-06-10 2022-01-04 普联技术有限公司 Data transmission method and device, storage medium and terminal equipment
WO2022135498A1 (en) * 2020-12-25 2022-06-30 华为技术有限公司 Method, apparatus and system for securely transmitting data
CN114697051A (en) * 2020-12-25 2022-07-01 华为技术有限公司 Method, device and system for safely transmitting data
CN114697051B (en) * 2020-12-25 2024-01-09 华为技术有限公司 Method, device and system for safely transmitting data

Also Published As

Publication number Publication date
EP3217592A1 (en) 2017-09-13
KR20080015810A (en) 2008-02-20
KR100965007B1 (en) 2010-06-21
JP5784778B2 (en) 2015-09-24
US20070041382A1 (en) 2007-02-22
US8228917B2 (en) 2012-07-24
JP2014147099A (en) 2014-08-14
EP2219318A1 (en) 2010-08-18
WO2006116620A3 (en) 2007-03-01
JP2012178843A (en) 2012-09-13
EP1875656A2 (en) 2008-01-09
JP2008539678A (en) 2008-11-13
CN101199158B (en) 2012-06-20
WO2006116620A2 (en) 2006-11-02

Similar Documents

Publication Publication Date Title
CN101199158B (en) Ciphering and re-ordering packets in a wireless communication system
US9312992B2 (en) Method and apparatus for data security and automatic repeat request implementation in a wireless communication system
JP6002829B2 (en) Radio protocol processing method and mobile communication transmitter in mobile communication system
US8379855B2 (en) Ciphering in a packet-switched telecommunications system
US20080226074A1 (en) Method and apparatus for ciphering packet units in wireless communications
US20070242703A1 (en) Binding/combining of plural telecommunications functions
US8189586B2 (en) Plural telecommunications functions having sharing transaction(s)
KR20200076558A (en) Method and apparatus for identfying security key based on pdcp layer device in next generation wireless communication system
US20050245276A1 (en) Synchronizing method and apparatus using error detection of sequence numbers to avoid synchronizing failure
KR100594022B1 (en) data ciphering/deciphering method in radio link control layer of radio network communication apparatus
TWI331468B (en) Method and apparatus for ciphering and re-ordering packets in a wireless communication system
JP4975806B2 (en) Multiple communication function with shared transaction (s)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant